lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Wed, 11 Feb 2015 14:36:12 -0500
From:	Paul Moore <pmoore@...hat.com>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
Cc:	linux-audit@...hat.com, linux-kernel@...r.kernel.org
Subject: [GIT PULL] Audit fixes for 3.20

Hi Linus,

Just one patch from the audit tree for v3.20, and a very minor one at that.  
The patch simply removes an old, unused field from the audit_krule structure, 
a private audit-only struct.  In audit related news, we did a proper overhaul 
of the audit pathname code and removed the nasty getname()/putname() hacks for 
audit, you should see those patches in Al's vfs tree if you haven't already.

That's it for audit this time, let's hope for a quiet -rcX series.

Thanks,
-Paul

---
The following changes since commit fcf22d8267ad2601fe9b6c549d1be96401c23e0b:

  audit: create private file name copies when auditing inodes
         (2014-12-30 09:26:21 -0500)

are available in the git repository at:

  git://git.infradead.org/users/pcmoore/audit upstream

for you to fetch changes up to 2fded7f44b8fcf79e274c3f0cfbd0298f95308f3:

  audit: remove vestiges of vers_ops (2015-01-20 10:48:32 -0500)

----------------------------------------------------------------
Richard Guy Briggs (1):
      audit: remove vestiges of vers_ops

 include/linux/audit.h | 1 -
 kernel/auditfilter.c  | 2 --
 2 files changed, 3 deletions(-)

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ